G06Q20/4015

Cash transaction machine
10354246 · 2019-07-16 · ·

Introduced is a technology for withdrawing cash from a cash transaction machine (CTM) by use of a mobile payment application installed on a mobile device of a consumer user (the CTM technology). Briefly described, the CTM technology enables a consumer user to identify one or more CTMs from which to withdraw cash by using his/her mobile device (e.g., a smartphone) as a virtual card. A particular CTM can be a conventional ATM or a POS system at a merchant's place of business. The user can use a mobile payment application installed on the user's mobile device to identify any nearby CTMs, request a withdrawal amount from a particular CTM from the identified nearby CTMs, receive a transaction code specific to that particular CTM, and physically obtain, or collect, the cash representative of the withdrawal amount at that particular CTM using the transaction code.

CUSTOMER IDENTIFICATION VERIFICATION PROCESS
20190213594 · 2019-07-11 ·

An example device may include one or more processors to receive a request for a service from a requestor user device; provide transaction information associated with the service to a provider user device, where the transaction information may include location information corresponding to a location at which the service may be provided; obtain verification information from the requestor user device based on an interaction associated with the requestor user device or the provider user device at the location, where the verification information may include one or more characteristics of the requestor user device; generate a verification token based on the one or more characteristics of the requestor user device; provide the verification token to the requestor user device; and provide the verification information to the provider user device to permit the provider user device to verify the requestor user device, in connection with performance of the service, based on receiving the verification information and obtaining the verification token from the requestor user device.

MERCHANT PAYMENT SYSTEM FOR CRYTPOCURRENCY
20190213590 · 2019-07-11 ·

Methods, systems, and devices for providing users with an option for selecting a cryoptocurrency payment method are described. A merchant payment apparatus may be used to collect payments using cryptocurrency. The merchant payment apparatus may then present the user with multiple payment options, including cryptocurrency payment options and non- cryptocurrency payment options. If a cryptocurrency payment option is selected, merchant payment apparatus may generate and display a machine readable label. A customer may scan the machine readable label and transmit a notification to a payment server. The payment server may then perform a cryptocurrency transaction, and may provide an indication to the merchant payment apparatus that the transaction is valid (i.e., that the cryptocurrency transaction has been completed or that funds are available for the completion of the transaction). After the merchant payment apparatus receives verification from the payment server, the sale may be completed.

TIME SENSITIVE GEO-LOCATION DATA FOR PUSH NOTIFICATIONS AFTER SHARED TRANSACTION PROCESSING
20190197514 · 2019-06-27 ·

There are provided systems and methods for time sensitive geo-location data for push notifications after shared transaction processing. A user may utilize a communication device to perform electronic transaction processing for a group of users at a location. The device may be geo-location enabled so that a service provider may detect a location of the device. Based on the geo-location of the user at the time of processing and other nearby geo-location enabled device, the service provider may determine other users that share in the transaction and are associated with the user using messaging connections and shared data transmissions. The service provider may determine the transaction that the user processed. The service provider may request that the other users provide the required reimbursement to the user that processed the transaction data. The other users' devices may receive a push notification and data to perform transaction processing.

System and method for authenticating a payment transaction
10332110 · 2019-06-25 · ·

A system and method of authenticating a payment transaction between a merchant and a customer in an electronic payment system are described. Transaction details presented by the merchant are received at a mobile electronic device, the customer is authenticated by means of an authentication token presented by the customer at an authentication terminal, and the geo-location of the mobile electronic device and the authentication terminal are compared to verify that the device and terminal are within a predefined geographical distance at the time the payment transaction is processed.

Efficient prevention of fraud
10332118 · 2019-06-25 · ·

This disclosure is directed to methods and systems for managing difficulty of use and security for a transaction. A transaction manager operating on a computing device may determining a range of possible steps for a transaction comprising security measures available for the transaction. The transaction manager may identify a threshold for a security metric to be exceeded for authorizing the transaction, the security metric to be determined based on performance of steps selected for the transaction. The transaction manager may select for the transaction at least one step from the range of possible steps, based on optimizing between (i) a difficulty of use quotient of the transaction from subjecting a user to the at least one step, and (ii) the security metric relative to the determined threshold.

Methods and apparatus for providing attestation of information using a centralized or distributed ledger

Methods and apparatus for providing authentication of information of a user are described. Upon validation of this information, a first hash function is applied to the user's information to create a hash. A public attest key is generated by combining the hash of the user's information with one or more public keys. An attestation address is generated based on the public attest key. A signed transaction which includes the attest key is communicated for storage in a centralized or distributed ledger at the attestation address.

Methods and systems of providing verification of information using a centralized or distributed ledger

A method and system of providing verification of information of a user relating to an attestation transaction is provided, and includes sending a request for information of the user, wherein the information has been previously attested to in an attestation transaction stored within a centralized or distributed ledger at an attestation address; receiving at a processor associated with a verifier the information of the user; sending a cryptographic challenge nonce; receiving at the processor associated with the verifier the cryptographic challenge nonce signed by the user's private key; verifying user identity with the cryptographic challenge nonce signed by the user's private key; deriving a public attest key by using the information of the user; deriving an attestation address using the public attest key; and verifying the existence of the attestation transaction at the attestation address in the centralized or distributed ledger.

HAPTIC INTERACTION
20190187859 · 2019-06-20 ·

A web site map of an external site, including information permitting determination of at least one pertinent location on the site, is obtained at a rules engine. At least one rule specifying peripheral behavior in a region adjacent the at least one pertinent location on the site is also obtained at the engine. Furthermore, an indication that a peripheral device corresponding to the at least one rule is being used to browse the site is also obtained at the engine. Instructions corresponding to the at least one rule specifying the peripheral behavior in the region adjacent the at least one pertinent location on the site are dispatched from the rules engine to the peripheral device. The instructions are configured to cause a stimulus to a user of the peripheral device prior to the user attempting to consummate an action on the web site.

SYSTEM AND COMPUTER-IMPLEMENTED METHOD FOR AUTHENTICATING COMMUNICATIONS AND COMMUNICATIVE DEVICES IN REAL TIME

A system and computer-implemented method for protecting against fraud by authenticating communications and communicative devices in real time and prior to accepting instructions or otherwise substantively engaging via the devices. A software app on the mobile phone of a cardholder creates a token, which is also provided to a card issuer. Historical authentication information is collected about the mobile phone and an associated cardholder. An authentication request, including the token, is received from the card issuer when communication is initiated by the mobile device. Current authentication information is also collected. The historical and current authentication information is analyzed, an authentication result is generated reflecting a likelihood that the mobile phone is being legitimately used by the cardholder associated with it, and the authentication result is communicated to the card issuer. Based on the authentication result, the card issuer decides whether to continue engaging in the communication via the mobile phone.